KLASIFIKASI MALWARE TROJAN HORSE MENGGUNAKAN METODE LONG SHORT TERM MEMORY (LSTM)

RAMADHANIL, MUHAMMAD and Stiawan, Deris and Afifah, Nurul (2024) KLASIFIKASI MALWARE TROJAN HORSE MENGGUNAKAN METODE LONG SHORT TERM MEMORY (LSTM). Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011382025101_cover.jpg]
Preview
Image
RAMA_56201_09011382025101_cover.jpg - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (285kB) | Preview
[thumbnail of RAMA_56201_09011382025101.pdf] Text
RAMA_56201_09011382025101.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_56201_09011382025101_TURNITIN.pdf] Text
RAMA_56201_09011382025101_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (6MB) | Request a copy
[thumbnail of RAMA_56201_09011382025101_0003047905_8958340022_01_front_ref.pdf] Text
RAMA_56201_09011382025101_0003047905_8958340022_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (1MB)
[thumbnail of RAMA_56201_09011382025101_0003047905_8958340022_02.pdf] Text
RAMA_56201_09011382025101_0003047905_8958340022_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (529kB) | Request a copy
[thumbnail of RAMA_56201_09011382025101_0003047905_8958340022_03.pdf] Text
RAMA_56201_09011382025101_0003047905_8958340022_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (786kB) | Request a copy
[thumbnail of RAMA_56201_09011382025101_0003047905_8958340022_04.pdf] Text
RAMA_56201_09011382025101_0003047905_8958340022_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011382025101_0003047905_8958340022_05.pdf] Text
RAMA_56201_09011382025101_0003047905_8958340022_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (12kB) | Request a copy
[thumbnail of RAMA_56201_09011382025101_0003047905_8958340022_06_ref.pdf] Text
RAMA_56201_09011382025101_0003047905_8958340022_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (124kB) | Request a copy
[thumbnail of RAMA_56201_09011382025101_0003047905_8958340022_07_lamp.pdf] Text
RAMA_56201_09011382025101_0003047905_8958340022_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (527kB) | Request a copy

Abstract

Trojan horse is a cyber attack that is carried out by disguising or infiltrating a system through programs or files that appear normal and harmless. Trojan horses can gain unauthorized access into computer systems allowing hackers to carry out various types of attacks and steal users' personal information by taking control of the system remotely. In addition, advances in cyber attack technology and techniques continue to expand the functionality and capabilities of Trojans, making them increasingly difficult to detect and defeat. Therefore, this study proposes to use the Long Short-Term Memory (LSTM) method which is an artificial intelligence technology part of neural networks that has become an effective and sophisticated approach in dealing with cyber threats that continue to grow, especially in trojan horses. This study uses a dataset of 31,265 from CIC-MalMem- 2022. The results show that the LSTM model is able to achieve an accuracy of 99%. These results identify that the LSTM model has reliable performance in performing classification. Keywords: Long Short-Term Memory (LSTM), Trojan Horse, Resampling Data

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Kata Kunci: Long Short-Term Memory (LSTM), Trojan Horse, Resampling Data
Subjects: T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Muhammad Ramadhanil
Date Deposited: 20 Jan 2025 07:27
Last Modified: 20 Jan 2025 07:27
URI: http://repository.unsri.ac.id/id/eprint/165873

Actions (login required)

View Item View Item